Peer Reviewed Conference Publications:


  • A. Tamilarasan, S. Mukkamala, A. H. Sung, K. Yendrapalli (2006) Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. Proceedings of IEEE International Joint Conference on Neural Networks (IJCNN 06), IEEE Computer Society Press. (in press)

  • S. Mukkamala, Q. Liu, R. Veeraghattam, A. H. Sung (2006) Feature Selection and Ranking of Key Genes for Tumor Classification (Using Microarray Gene Expression Data). Proceedings of The 8 th International Conference on Artificial Intelligence and Soft Computing (ICAISC 06), Springer-Verlag series “Lecture Notes in Artificial Intelligence”. (in press)

  • R. Veeraghattam, P. Chavez, S. Mukkamala, A. H. Sung (2006) Effective Honeypot Detection. Proceedings of 5 th E uropean Conference on Information Warfare and Security (ECIW 06) . (in press)

  • S. Mukkamala, J. Xu , A. H. Sung (2006) Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. Proceedings of Innovations in Applied Artificial Intelligence, 19th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Lecture Notes in Computer Science. (in press)

  • S. Mukkamala, G. D. Tilve, A. H. Sung, B. Ribeiro, A . S. Vieira (2006) Computational Intelligent Techniques for Financial Distress Detection. Proceedings of International Symposium on Neural Networks (ISNN 06). (in press)

  • S. Mukkamala, A. H. Sung, B. Ribeiro , A. S. Vieira, J. C. Neves (2006) Model Selection and Feature Ranking for Financial Distress Classification. Proceedings of 8th International Conference on Enterprise Information Systems (ICEIS 2006), INSTICC - Institute for Systems and Technologies of Information, Control and Communication. (in press)

  • P. Chavez, S. Mukkamala, A. H. Sung (2006) Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). Proceedings of The IEEE 20th International Conference on Advanced Information Networking and Applications (Accepted to SNDS-06), IEEE Computer Society Press. (in press)

  • S. Mukkamala, Q. Liu, R. Veeraghattam, A. H. Sung (2005) Computational Intelligent Techniques for Tumor Classification (Using Micro array Gene Expression Data). Proceedings of World Congress on Lateral Computing (WCLC 2005) . (Extended version appeared in International Journal of Lateral Computing). [Reference [11] was accidentally omitted during the editing process of the original manuscript. Complete reference is: R. J. Lewis. An Introduction to Classification and Regression Tree (CART) Analysis. Annual Meeting of the Society for Academic Emergency Medicine, 2000.]

  • J. Xu, A. H. Sung, Q. Liu, S. Mukkamala (2005) Fraud Detection System Based on Behavior Mining and Anomaly Detection. Proceedings of Second Indian International Conference on Artificial Intelligence (IICAI 2005). ISBN 0-9727412-1-6, pp 3487-3501.

  • Q. Liu, A. H. Sung, J. Xu, S. Mukkamala , (2005) Gene Expression Data Selection and Computational Intelligence for Tumor Classification. Proceedings of 3rd International conference on Computational Intelligence, Robotics and Autonomous Systems (CIRAS 2005), ISBN: 981-05-4674-2.

  • S. Mukkamala, A. H. Sung, R. Veeraghattam, A. S. Vieira, J. C. Neves (2005) Are Neural Networks the Best Classifiers for Bankruptcy Detection?. Proceedings of The Twelth International Conference on Neural Information Processing (ICONIP), IEEE Computer Society Press.

  • S. Mukkamala, A. H. Sung, R. Veeraghattam (2005) Classification Models For Intrusion Detection Systems. Proceedings of 2nd International Conference on Intelligent Knowledge Systems (IKS-2005), ISSN 1304-5253, pp. 131-136. [Reference [12] was accidentally omitted during the editing process of the original manuscript. Complete reference is: R. J. Lewis. An Introduction to Classification and Regression Tree (CART) Analysis. Annual Meeting of the Society for Academic Emergency Medicine, 2000.]

  • T. Sulaiman, K. Ramamurthy, S. Mukkamala, A. H. Sung (2005) Disassembled Code Analyzer for Malware (DCAM). Proceedings of IEEE International Conference on Information Reuse and Integration , IEEE Computer Society Press, pp. 398-404.

  • T. Sulaiman, K. Ramamurthy, S. Mukkamala, A. H. Sung (2005) Malware Examiner using Disassembled Code (MEDiC). Proceedings of 6th IEEE Information Assurance Workshop, IEEE Computer Society Press, pp. 428-430.

  • S. Mukkamala, B. Ribeiro, A. H. Sung. (2005) Model Selection for Kernel Based Intrusion Detection Systems . Proceedings of International Conference on Adaptive and Natural Computing Algorithms (ICANNGA), Springer-Verlag, pp. 458-461.

  • A. H. Sung, J. Xu, P. Chavez, S. Mukkamala (2004) Polymorphic Malicious Executable Scanner by API Sequence Analysis. Proceedings of International Conference on Hybrid Intelligent Systems, IEEE Computer Society Press, pp. 378-383.

  • P. Chavez, S. Mukkamala, A. H. Sung (2004) Website Visitor Classification Using Machine Learning. Proceedings of International Conference on Hybrid Intelligent Systems, IEEE Computer Society Press, pp. 384-389.

  • A. H. Sung, J. Xu, P. Chavez, S. Mukkamala (2004) Static Analyzer for Vicious Executables (SAVE). Proceedings of 20 th Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society Press, ISBN 0-7695-2252-1, pp. 326-334.

  • S. Mukkamala, A. H. Sung (2004) Coordinated Distributed Multi Attacks (CDMA). Proceedings of IEEE International Conference on Advances in Intelligent Systems Theory and Applications, IEEE Computer Society Press, ISBN 2-9599776-8-8, PID 011-04.

  • A. H. Sung, S. Mukkamala (2004) The Feature Selection and Intrusion Detection Problems. Proceedings of the 9 th Asian Computing Science Conference, Lecture Notes in Computer Science Vol. 3321, Springer, ISBN 3-540-24087-X, pp. 468-483.

  • A. S. Vieira, B. Ribeiro, S. Mukkamala, J. C. Neves, A. Sung. (2004) On the Performance of Learning Machines for Bankruptcy Detection. Proceedings of IEEE International Conference on Computational Cybernetics (ICCC 2004), IEEE Computer Society Press, pp. 323-327.

  • A. H. Sung, J. Xu, K. Ramamurthy, P. Chavez, S. Mukkamala, T. Sulaiman, T. Xie (2004) Static Analyzer for Vicious Executables (SAVE). Presented in Work-in-progress Section of IEEE Symposium on Security and Privacy.

  • S. Mukkamala, A. H. Sung (2004) A Framework for Countering Denial of Service Attacks (Knowledge Discovery Approach). Proceedings of IEEE International Conference Systems, Man, and Cybernetics, IEEE Computer Society Press, ISBN 0-7803-8567-5, pp. 3273-3278.

  • T. Xie, A. H. Sung, S. Mukkamala, Q. Liu (2004) Reactive Tamper Detection for Image Authentication. Proceedings of the Fourth International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing, Springer Verlag, Germany.

  • S. Mukkamala, A. H. Sung, A. Abraham (2004) Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. Proceedings of Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Lecture Notes in Computer Science 3029 Springer, ISBN 3-540-22007-0, pp. 634-642.

  • S. Mukkamala, A. H. Sung (2004) Computational Intelligent Techniques for Detecting Denial of Service Attacks. Proceedings of Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Lecture Notes in Computer Science 3029 Springer, ISBN 3-540-22007-0, pp. 616-623.

  • M. Paprzycki, A. Abraham, R. Guo, S. Mukkamala. (2004) Data Mining Approach for Analyzing Call Center Performance. Proceedings of Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE). Lecture Notes in Computer Science 3029 Springer 2004, ISBN 3-540-22007-0, pp. 1092-1101. (nominated as best paper).

  • S. Mukkamala, A. H. Sung, A. Abraham, V. Ramos (2004) Intrusion Detection Systems using Adaptive Regression Splines. Proceedings of 6th International Conference on Enterprise Information Systems (ICEIS 2004), INSTICC - Institute for Systems and Technologies of Information, Control and Communication, ISBN 972-8865-00-7, Vol. 3, pp. 26-33. (Nominated Best Paper)

  • A. H. Sung, G. K. Tadiparthi, S. Mukkamala (2004) Defeating the Current Steganlytic Techniques ( Robust Steganography). Proceedings of International Conference on Coding and Computing, IEEE Computer Society Press, pp. 440-444.

  • S. Mukkamala, A. H. Sung, A. Abraham (2003) Distributed Multi-Intelligent Agent Frame Work for Detection of Stealthy Probes. Proceedings of International Conference on Hybrid Intelligent Systems, published as Design and Application of Hybrid Intelligent Systems and Applications, Frontiers in Artificial Intelligence and Applications Series, Vol. 104, IOS Press, pp. 779-788.

  • S. Mukkamala, A. H. Sung (2003) Artificial Intelligent Techniques for Intrusion Detection. Proceedings of IEEE International Conference Systems, Man, and Cybernetics, IEEE Computer Society Press, ISBN 0-7803-7953-5, pp. 1266-1272.

  • S. Mukkamala, A. H. Sung. (2003) A Distributed Agent Based IDS for Stealthy Probe Detection. Proceedings of First Indian International Conference on Artificial Intelligence (IICAI 2003) , pp. 413-422. (Nominated Best Papers)

  • S. Mukkamala, A. H. Sung (2003) Soft Computing Techniques for Intrusion Detection. Proceedings of Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University. ONR and AFSOR Sponsored Workshop on Intrusion Detection.

  • G. K. Tadiparthi, S. Mukkamala, A. H. Sung (2003) Robust Steganography Using Animations. Proceedings of the 7 th IASTED International Conference on Internet and Multimedia Systems and Applications, pp. 467-472.

  • S. Mukkamala, A. H. Sung (2003) A Comparative Study of Techniques for Intrusion Detection. Proceedings of 15 th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), IEEE Computer Society Press, pp. 570-579.

  • S. Mukkamala, A. H. Sung, A. Abraham (2003) Intrusion Detection Using Ensemble of Soft Computing Paradigms . Proceedings of the Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing, Springer Verlag, Germany, pp. 239-248.

  • G. K. Tadiparthi, S. Mukkamala, A. H. Sung (2003) A Steganography Database. Proceedings of Digital Forensics Research Workshop, Cleveland.

  • S. Mukkamala, A. H. Sung (2003) Detecting Denial of Service Attacks Using Support Vector Machines. Proceedings of IEEE International Conference on Fuzzy Systems, IEEE Computer Society Press, pp. 1231-1236.

  • A. H. Sung, S. Mukkamala (2003) Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. Proceedings of the 2003 International Symposium on Applications and the Internet Technology, IEEE Computer Society Press, pp. 209-216.

  • A. H. Sung, S. Mukkamala (2003) Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines. Proceedings of the 82nd Annual Meeting of the Transportation Research Board (of the National Academies).

  • S. Mukkamala, A. H. Sung (2002) Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. Proceedings of Second International Conference on Hybrid Intelligent Systems, published as Soft Computing Systems, Design, Management, and Applications, Frontiers in Artificial Intelligence and Applications Series, Vol. 87, IOS Press, pp. 351-361.

  • S. Mukkamala, A. H. Sung, S. Veeramachaneni (2002) Learning Machines for Intrusion Detection. Proceedings of ANNIE: Artificial Neural Networks in Engineering, published as Intelligent Engineering Systems through Artificial Neural Networks, Vol. 12 (C. H. Dagli, et al. Editors), ASME Press, pp. 465-470.

  • S. Mukkamala, A. H. Sung (2002) Audit Data Reduction Using Neural Networks and Support Vector Machines. Proceedings of Digital Forensics Research Workshop, August 7-9, Syracuse University, Center for Systems Assurance.

  • S. Mukkamala, A. H. Sung (2002) Learning machines for Intrusion Detection: Support Vector Machines and Neural Networks. Proceedings of International Conference on Security and Management, pp. 525-531.

  • S. Mukkamala, A. H. Sung (2002) Feature ranking and Selection for Intrusion detection Systems. Proceedings of International Conference on Information and Knowledge Engineering , pp. 503-509.

  • S. Mukkamala, A. H. Sung (2002) I dentifying Key Features for Intrusion Detection Using Neural Networks. Proceedings of 15 th International Conference on Computer Communications, pp. 1132-1138.

  • S. Mukkamala, A. H. Sung (2002) Comparison of Neural Networks and Support Vector Machines in Intrusion Detection. Proceedings of Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University.

  • S. Mukkamala, G. Janoski, A. H. Sung (2002) Intrusion Detection Using Neural Networks and Support Vector Machines. Proceedings of IEEE International Joint Conference on Neural Networks, IEEE Computer Society Press, pp. 1702-1707.

  • S. Mukkamala, G. Janoski, A. H. Sung (2002) Intrusion Detection Using Support Vector Machines. Proceedings of Advanced Simulation Technologies Conference, pp. 178-183.

  • G. Janoski, S. Mukkamala, A.H. Sung. (2002) A Comparison of Soft Computing Methods for Reservoir Simulation, Soft Computing and Industry – Recent Applications, Springer Verlag, ISBN 1-85233-539-4, pp.821-832.

  • S. Mukkamala, G. Janowski, A. H. Sung. (2001) Intrusion Detection Using Neural Networks and Support Vector Machines. Proceedings of Hybrid Information Systems Advances in Soft Computing, Springer Verlag, ISBN 3790814806, pp.121-138.

  • S. Mukkamala, G. Janowski, A. H. Sung. (2001) Monitoring Information System Security . Proceedings of the 11th Annual Workshop on Information Technologies & Systems, pp.139-144.

  • G. Janoski, N. Benslimame, S. Mukkamala, and A. Sung. (2001) Using Neural Networks for System Security Monitoring. Proceedings of International Conference Intelligent Systems and Control, pp. 360-365.
    G. Janoski, S. Mukkamala, A.H. Sung. (2001) A Comparison of Soft Computing Methods for Reservoir Simulation, World Conference on Soft Computing in Industrial Applications (WSC6), (selected as a best paper, http://www.vision.fhg.de/wsc6/bestpapers.html).





Locations of visitors to this page